The GDPR (Global Data Protection Regulations) aims to strengthen and make more homogeneous personal data protection of citizens and residents of the European Union, both within and outside the borders, stating that data relating to a person have the latter as its sole owner. Organizations that hold personal information in their digital assets must therefore take care to adopt appropriate procedures for the management and control of such data.
Each year, companies produce exponentially larger sizes of sensitive data digitized than the previous year. Contracts, communications, reports, documents, audio and video recordings, chats, tickets,… to be understood and analyzed, to be stored with a depth of time of at least ten years, to be protected through GDPR-compliant mode that allows easy access to all information belonging to a specific customer, wherever it is available, also to be able to respond adequately to the right to cancellation or oblivion.
Moreover, despite the fact that mature IT organizations already comply with the security rules for accessing and distributing information in company databases, a multitude of sensitive data remains in those unstructured and unclassified streams that make up most of the confidential information, whose visibility is often at the limit of respect for privacy. These streams, mostly represented by logs, are an incredibly knowledgeable resource, not only for security, but also for the control of the service provided and for business stakeholders.
The most effective response to these issues comes from the new technological paradigms conveyed by new generation tools that are flexible and able to guarantee an adequate ROI.